{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:13Z","timestamp":1750306573228,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T00:00:00Z","timestamp":1404864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,9]]},"DOI":"10.1145\/2721956.2721990","type":"proceedings-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:31:04Z","timestamp":1431361864000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["On the description of software security patterns"],"prefix":"10.1145","author":[{"given":"Michaela","family":"Bunke","sequence":"first","affiliation":[{"name":"Universit\u00e4t Bremen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,7,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexander C. Ishikawa S. and Silverstein M. 1977. A Pattern Language: Towns Buildings Construction. Oxford University Press New York.  Alexander C. Ishikawa S. and Silverstein M. 1977. A Pattern Language: Towns Buildings Construction . Oxford University Press New York."},{"volume-title":"Security Design Patterns","author":"Blakley B.","key":"e_1_3_2_1_2_1","unstructured":"Blakley , B. , Heath , C. , and members of The Open Group Security Forum. 2004. Security Design Patterns . The Open Group . www.opengroup.org\/onlinepubs\/9299969899\/toc.pdf. Blakley, B., Heath, C., and members of The Open Group Security Forum. 2004. Security Design Patterns. The Open Group. www.opengroup.org\/onlinepubs\/9299969899\/toc.pdf."},{"volume-title":"Proceedings of the International Conferences on Pervasive Patterns and Applications. IARIA Conferences, XPS (Xpert Publishing Services), 138--143","author":"Bunke M.","key":"e_1_3_2_1_3_1","unstructured":"Bunke , M. , Koschke , R. , and Sohr , K . 2011. Application-domain classification for security patterns . In Proceedings of the International Conferences on Pervasive Patterns and Applications. IARIA Conferences, XPS (Xpert Publishing Services), 138--143 . Bunke, M., Koschke, R., and Sohr, K. 2011. Application-domain classification for security patterns. In Proceedings of the International Conferences on Pervasive Patterns and Applications. IARIA Conferences, XPS (Xpert Publishing Services), 138--143."},{"key":"e_1_3_2_1_4_1","article-title":"Organizing security patterns related to security and pattern recognition requirements","volume":"5","author":"Bunke M.","year":"2012","unstructured":"Bunke , M. , Koschke , R. , and Sohr , K. 2012 . Organizing security patterns related to security and pattern recognition requirements . International Journal On Advances in Security 5 , 1&2, 46--67. Bunke, M., Koschke, R., and Sohr, K. 2012. Organizing security patterns related to security and pattern recognition requirements. International Journal On Advances in Security 5, 1&2, 46--67.","journal-title":"International Journal On Advances in Security"},{"key":"e_1_3_2_1_5_1","unstructured":"Buschmann F. Meunier R. Rohnert H. Sommerlad P. and Stal M. 1996. Pattern-Oriented Software Architecture: A System of Patterns. Wiley Chichester UK.   Buschmann F. Meunier R. Rohnert H. Sommerlad P. and Stal M. 1996. Pattern-Oriented Software Architecture: A System of Patterns . Wiley Chichester UK."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.17"},{"key":"e_1_3_2_1_7_1","unstructured":"Dougherty C. Sayre K. Seacord R. C. Svoboda D. and Togashi K. 2009. Secure design patterns. technical report CMU\/SEI 2009-TR-010 Carnegie Mellon University Software Engineering Institute. Oct. www.cert.org\/archive\/pdf\/09tr010.pdf.  Dougherty C. Sayre K. Seacord R. C. Svoboda D. and Togashi K. 2009. Secure design patterns. technical report CMU\/SEI 2009-TR-010 Carnegie Mellon University Software Engineering Institute. Oct. www.cert.org\/archive\/pdf\/09tr010.pdf."},{"volume-title":"Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 381--398","author":"Fernandez E. B.","key":"e_1_3_2_1_8_1","unstructured":"Fernandez , E. B. and Sinibaldi , J . 2003. More patterns for operating systems access control . In Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 381--398 . Fernandez, E. B. and Sinibaldi, J. 2003. More patterns for operating systems access control. In Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 381--398."},{"volume-title":"Proceedings of the International Workshop on Software Patterns and Quality. Information Processing Society of Japan, 47--48","author":"Fernandez E. B.","key":"e_1_3_2_1_9_1","unstructured":"Fernandez , E. B. , Yoshioka , N. , and Washizaki , H . 2007. Using security patterns to build secure systems . In Proceedings of the International Workshop on Software Patterns and Quality. Information Processing Society of Japan, 47--48 . Fernandez, E. B., Yoshioka, N., and Washizaki, H. 2007. Using security patterns to build secure systems. In Proceedings of the International Workshop on Software Patterns and Quality. Information Processing Society of Japan, 47--48."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766140"},{"key":"e_1_3_2_1_11_1","volume-title":"Design Patterns: Elements of Object-Oriented Software","author":"Gamma E.","year":"1994","unstructured":"Gamma , E. , Helm , R. , Johnson , R. , and Vlissides , J . 1994 . Design Patterns: Elements of Object-Oriented Software . Addison Wesley . Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1994. Design Patterns: Elements of Object-Oriented Software. Addison Wesley."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Conference on Pattern Languages of Programs. 1--13","author":"Gondi V.","year":"2010","unstructured":"Gondi , V. 2010 . Multiple secure observers using j2ee . In Proceedings of the Conference on Pattern Languages of Programs. 1--13 . http:\/\/www.hillside.net\/plop\/2010\/papers\/gondi.pdf. Gondi, V. 2010. Multiple secure observers using j2ee. In Proceedings of the Conference on Pattern Languages of Programs. 1--13. http:\/\/www.hillside.net\/plop\/2010\/papers\/gondi.pdf."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Conference on Pattern Languages of Programs. 1--9. http:\/\/www.munawarhafiz.com\/research\/patterns\/Unique%20Atomic%20Chunks.pdf.","author":"Hafiz M.","year":"2004","unstructured":"Hafiz , M. 2004 . Unique atomic chunks - a pattern for security and reliability . In Proceedings of the Conference on Pattern Languages of Programs. 1--9. http:\/\/www.munawarhafiz.com\/research\/patterns\/Unique%20Atomic%20Chunks.pdf. Hafiz, M. 2004. Unique atomic chunks - a pattern for security and reliability. In Proceedings of the Conference on Pattern Languages of Programs. 1--9. http:\/\/www.munawarhafiz.com\/research\/patterns\/Unique%20Atomic%20Chunks.pdf."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Conference on Pattern Languages of Programs. 1--9. http:\/\/www.hillside.net\/plop\/2005\/proceedings\/PLoP2005_mhafiz0_2.pdf.","author":"Hafiz M.","year":"2005","unstructured":"Hafiz , M. 2005 . Secure pre-forking - a pattern for performance and security . In Proceedings of the Conference on Pattern Languages of Programs. 1--9. http:\/\/www.hillside.net\/plop\/2005\/proceedings\/PLoP2005_mhafiz0_2.pdf. Hafiz, M. 2005. Secure pre-forking - a pattern for performance and security. In Proceedings of the Conference on Pattern Languages of Programs. 1--9. http:\/\/www.hillside.net\/plop\/2005\/proceedings\/PLoP2005_mhafiz0_2.pdf."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v38:15"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the International Conference on Artificial Intelligence and Digital Communications. 1--8. Last access: 16","author":"Halkidis S. T.","year":"2014","unstructured":"Halkidis , S. T. , Chatzigeorgiou , A. , and Stephanides , G . 2006. A practical evaluation of security patterns . In Proceedings of the International Conference on Artificial Intelligence and Digital Communications. 1--8. Last access: 16 .02. 2014 . Halkidis, S. T., Chatzigeorgiou, A., and Stephanides, G. 2006. A practical evaluation of security patterns. In Proceedings of the International Conference on Artificial Intelligence and Digital Communications. 1--8. Last access: 16.02.2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772070.1772087"},{"volume-title":"Proceedings of the Conference on Pattern Languages of Programs. 1--8. http:\/\/hillside.net\/plop\/plop99\/proceedings\/Fernandez4\/Authenticator3.PDF.","author":"Jr L. B.","key":"e_1_3_2_1_18_1","unstructured":"Jr , L. B. , Brown , F. L. , Divietri , J. , Villegas , G. D. D. , and Fernandez , E. B . 1999. The authenticator pattern . In Proceedings of the Conference on Pattern Languages of Programs. 1--8. http:\/\/hillside.net\/plop\/plop99\/proceedings\/Fernandez4\/Authenticator3.PDF. Jr, L. B., Brown, F. L., Divietri, J., Villegas, G. D. D., and Fernandez, E. B. 1999. The authenticator pattern. In Proceedings of the Conference on Pattern Languages of Programs. 1--8. http:\/\/hillside.net\/plop\/plop99\/proceedings\/Fernandez4\/Authenticator3.PDF."},{"key":"e_1_3_2_1_19_1","unstructured":"Kienzle D. M. Elder M. C. Tyree D. and Edwards-Hewitt J. 2003. Security patterns repository version 1.0. http:\/\/www.scrypt.net\/~celer\/securitypatterns\/repository.pdf.  Kienzle D. M. Elder M. C. Tyree D. and Edwards-Hewitt J. 2003. Security patterns repository version 1.0. http:\/\/www.scrypt.net\/~celer\/securitypatterns\/repository.pdf."},{"volume-title":"Security Design Patterns: Survey and Evaluation. IEEE Canadian Conference on Electrical and Computer Engineering, 1605--1608","author":"Laverdiere M.","key":"e_1_3_2_1_20_1","unstructured":"Laverdiere , M. , Mourad , A. , Hanna , A. , and Debbabi , M . 2006 . Security Design Patterns: Survey and Evaluation. IEEE Canadian Conference on Electrical and Computer Engineering, 1605--1608 . Laverdiere, M., Mourad, A., Hanna, A., and Debbabi, M. 2006. Security Design Patterns: Survey and Evaluation. IEEE Canadian Conference on Electrical and Computer Engineering, 1605--1608."},{"volume-title":"Proceedings of the Conference on Pattern Languages of Programs.","author":"Ma\u00f1a A.","key":"e_1_3_2_1_21_1","unstructured":"Ma\u00f1a , A. , Fernandez , E. B. , Ruiz , J. F. , and Rudolph , C . 2013. Towards computer-oriented security patterns . In Proceedings of the Conference on Pattern Languages of Programs. Ma\u00f1a, A., Fernandez, E. B., Ruiz, J. F., and Rudolph, C. 2013. Towards computer-oriented security patterns. In Proceedings of the Conference on Pattern Languages of Programs."},{"key":"e_1_3_2_1_22_1","unstructured":"Meszaros G. and Doble J. 1997. A pattern language for pattern writing. In Pattern Languages of Program Design R. C. Martin D. Riehle and F. Buschmann Eds. Vol. 3. Addison-Wesley Longman Publishing Co. Inc. Boston MA USA 529--574.   Meszaros G. and Doble J. 1997. A pattern language for pattern writing. In Pattern Languages of Program Design R. C. Martin D. Riehle and F. Buschmann Eds. Vol. 3. Addison-Wesley Longman Publishing Co. Inc. Boston MA USA 529--574."},{"volume-title":"Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 399--416","author":"Mouratidis H.","key":"e_1_3_2_1_23_1","unstructured":"Mouratidis , H. , Giorgini , P. , and Schumacher , M . 2003. Security patterns for agent systems . In Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 399--416 . Mouratidis, H., Giorgini, P., and Schumacher, M. 2003. Security patterns for agent systems. In Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 399--416."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753196.1753226"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753196.1753223"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the European Conference on Pattern Languages of Programs. 1--8.","author":"Schumacher M.","year":"2001","unstructured":"Schumacher , M. 2001 . Merging security patterns . In Proceedings of the European Conference on Pattern Languages of Programs. 1--8. Schumacher, M. 2001. Merging security patterns. In Proceedings of the European Conference on Pattern Languages of Programs. 1--8."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 289--300","author":"Schumacher M.","year":"2002","unstructured":"Schumacher , M. 2002 . Security patterns and security standards - with selected security patterns for anonymity and privacy . In Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 289--300 . Schumacher, M. 2002. Security patterns and security standards - with selected security patterns for anonymity and privacy. In Proceedings of the European Conference on Pattern Languages of Programs. UVK - Universitaetsverlag Konstanz, 289--300."},{"key":"e_1_3_2_1_28_1","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"Schumacher M.","year":"2005","unstructured":"Schumacher , M. , Fernandez , E. B. , Hybertson , D. , and Buschmann , F . 2005 . Security Patterns: Integrating Security and Systems Engineering . John Wiley & Sons . Schumacher, M., Fernandez, E. B., Hybertson, D., and Buschmann, F. 2005. Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Conference on Pattern Languages of Programs. 1--17","author":"Schumacher M.","year":"2001","unstructured":"Schumacher , M. and Roedig , U . 2001. Security engineering with patterns . In Proceedings of the Conference on Pattern Languages of Programs. 1--17 . http:\/\/www.hillside.net\/plop\/plop 2001 \/accepted_submissions\/PLoP2001\/mschumacher0\/PLoP2001_mschumacher0_1.pdf. Schumacher, M. and Roedig, U. 2001. Security engineering with patterns. In Proceedings of the Conference on Pattern Languages of Programs. 1--17. http:\/\/www.hillside.net\/plop\/plop2001\/accepted_submissions\/PLoP2001\/mschumacher0\/PLoP2001_mschumacher0_1.pdf."},{"key":"e_1_3_2_1_30_1","unstructured":"Steel C. Nagappan R. and Lai R. 2005. Core Security Patterns: Best Practices and Strategies for J2EE\u2122 Web Services and Identity Management. Prentice Hall International.  Steel C. Nagappan R. and Lai R. 2005. Core Security Patterns: Best Practices and Strategies for J2EE\u2122 Web Services and Identity Management . Prentice Hall International."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Nordic Conference on Pattern Languages of Programs. 65--70","author":"Weiss M.","year":"2006","unstructured":"Weiss , M. 2006 . Credential delegation: Towards grid security patterns . In Proceedings of the Nordic Conference on Pattern Languages of Programs. 65--70 . http:\/\/hillside.net\/vikingplop\/vikingplop2006\/VikingPLoP2006_Proceedings.pdf. Weiss, M. 2006. Credential delegation: Towards grid security patterns. In Proceedings of the Nordic Conference on Pattern Languages of Programs. 65--70. http:\/\/hillside.net\/vikingplop\/vikingplop2006\/VikingPLoP2006_Proceedings.pdf."},{"volume-title":"Proceedings of the Conference on Pattern Languages of Programs. Monticello\/IL, 1--31","author":"Yoder J.","key":"e_1_3_2_1_32_1","unstructured":"Yoder , J. and Barcalow , J . 1997. Architectural patterns for enabling application security . In Proceedings of the Conference on Pattern Languages of Programs. Monticello\/IL, 1--31 . http:\/\/hillside.net\/plop\/plop97\/Proceedings\/yoder.pdf. Yoder, J. and Barcalow, J. 1997. Architectural patterns for enabling application security. In Proceedings of the Conference on Pattern Languages of Programs. Monticello\/IL, 1--31. http:\/\/hillside.net\/plop\/plop97\/Proceedings\/yoder.pdf."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2201\/NiiPi.2008.5.5"},{"key":"e_1_3_2_1_34_1","unstructured":"Yskout K. Heyman T. Scandariato R. and Joosen W. 2006. A system of security patterns. Report CW 469 K. U. Leuven Department of Computer Science. Dec. http:\/\/www.cs.kuleuven.be\/publicaties\/rapporten\/cw\/CW469.abs.html.  Yskout K. Heyman T. Scandariato R. and Joosen W. 2006. A system of security patterns. Report CW 469 K. U. Leuven Department of Computer Science. Dec. http:\/\/www.cs.kuleuven.be\/publicaties\/rapporten\/cw\/CW469.abs.html."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Conference on Pattern Languages of Programs. 1--14","author":"Zhou Y.","year":"2002","unstructured":"Zhou , Y. , Zhao , Q. , and Perry , M . 2002. Policy enforcement pattern . In Proceedings of the Conference on Pattern Languages of Programs. 1--14 . http:\/\/www.hillside.net\/plop\/plop 2002 \/final\/ZZPerry_PLOP.pdf. Zhou, Y., Zhao, Q., and Perry, M. 2002. Policy enforcement pattern. In Proceedings of the Conference on Pattern Languages of Programs. 1--14. http:\/\/www.hillside.net\/plop\/plop2002\/final\/ZZPerry_PLOP.pdf."}],"event":{"name":"EuroPLoP 2014: 19th European Conference on Pattern Languages of Programs","acronym":"EuroPLoP 2014","location":"Irsee Germany"},"container-title":["Proceedings of the 19th European Conference on Pattern Languages of Programs"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2721956.2721990","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2721956.2721990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:28Z","timestamp":1750227208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2721956.2721990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,9]]},"references-count":35,"alternative-id":["10.1145\/2721956.2721990","10.1145\/2721956"],"URL":"https:\/\/doi.org\/10.1145\/2721956.2721990","relation":{},"subject":[],"published":{"date-parts":[[2014,7,9]]},"assertion":[{"value":"2014-07-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}